No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Privileged Access Manager vs RSA Identity Governance and Lifecycle comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Privileged Access ...
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
230
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Privileged Access Management (PAM) (1st), Mainframe Security (1st), Operational Technology (OT) Security (3rd)
RSA Identity Governance and...
Average Rating
7.0
Reviews Sentiment
5.9
Number of Reviews
10
Ranking in other categories
Identity Management (IM) (20th)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. CyberArk Privileged Access Manager is designed for Privileged Access Management (PAM) and holds a mindshare of 10.4%, down 18.5% compared to last year.
RSA Identity Governance and Lifecycle, on the other hand, focuses on Identity Management (IM), holds 1.1% mindshare, down 1.4% since last year.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Privileged Access Manager10.4%
Delinea Secret Server4.5%
One Identity Safeguard4.4%
Other80.7%
Privileged Access Management (PAM)
Identity Management (IM) Mindshare Distribution
ProductMindshare (%)
RSA Identity Governance and Lifecycle1.1%
SailPoint Identity Security Cloud10.0%
Microsoft Entra ID6.9%
Other82.0%
Identity Management (IM)
 

Featured Reviews

Atul-Gujar - PeerSpot reviewer
CyberArk manager at a comms service provider with 10,001+ employees
Secures critical infrastructures with essential user session audit records
A potential area for improvement is enhancing support for cluster environments and distributed Vaults. Clients in multiple countries that need central access have different challenges that require better solutions from CyberArk. For financial services, CyberArk can improve incident response by ensuring fast support for critical priority tickets to meet compliance requirements. Providing more documentation on CyberArk is recommended for new team members to enhance their troubleshooting capabilities. I understand it's up to the client, but 99% fail to change the demo key, so it's crucial for CyberArk to emphasize changing the key and documenting it as part of the installation process.
Harshul Nayak - PeerSpot reviewer
Senior Project Manager at a consultancy with 10,001+ employees
Streamline identity lifecycle management with intuitive interfaces and robust policy features
The functions of RSA Identity Governance and Lifecycle, especially the IGA, are quite strong with their custom forms and workflows integrated. The user interface is very friendly and easy to use, making it a good product overall. However, it still has to be on-premise and the cloud version is not easily accessible, as dedicated instances are required and machines cannot be shared as multi-tenant for various customers. The advanced policy features of RSA definitely help in defining certain policies such as segregation of duties. That's particularly useful along with creating different access reviews. Regarding access control in simplifying access management, RSA Identity Governance and Lifecycle has strong foundations of groups and roles, which help in defining all policies very easily. This makes it very easy to integrate with other access management tools or privileged access management tools.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Accounts are managed, passwords change frequently, and we have better audit logs!"
"It helps our customers in their software requirement imports."
"Service count rotation is probably one of my favorite features... The ability to automatically rotate any password I need to really helps with the entire enterprise strategy that we're pushing right now."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"The most valuable features of CyberArk Enterprise Password Vault are password vaulting and automatic rotation of passwords after use."
"It has a lot of good tools, including everything we need."
"We chose CyberArk because of its great functionalities, the ability to be deployed granularly at a different scale for each function, and the ability to be deployed in a distributed infrastructure."
"The benefit is knowing where your accesses are, who has access to what, and it provides improved security around having your credentials locked down and rotated regularly."
"All of the features in this product are good and this is a product that I recommend."
"Customer service was always exceptional and if we needed to call the regular customer support number for administrative tasks on the account, they were always helpful and resolved our cases within a few days."
"It improved security."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"The most valuable feature is the security, in particular, the One Time Password support."
 

Cons

"The lead product has a slow process."
"The pricing is too expensive and should be reduced."
"For least privilege management, we need a different level of certification from privileged management."
"Over the past seven years, I have seen a lot of ups and downs with the product."
"Initial setup is complex. Lots of architecture, lots of planning, and lots of education and training are needed."
"The current interface is not very intuitive."
"On the UI level, things could be better."
"There were a lot of manual steps in the initial setup which could have been automated."
"It was expensive initially, but day to day costs are minimal."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring."
"If you use the appliance version then it won't handle a huge database volume."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"The stability of RSA Identity Governance and Lifecycle could improve; it has some bugs that need to be fixed."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
 

Pricing and Cost Advice

"CyberArk Enterprise Password Vault is a very expensive product."
"CyberArk Privileged Access Manager is on the expensive side. It is very expensive."
"No, I do not have any advice on the price of the product."
"I haven't seen the numbers. I know it is not cheap, but I don't know what it is. I would rate it a six out of ten in terms of pricing. It is definitely more expensive than the other product, but it also provides more functionality, and it is modular too. So, we pay for the functionality we're actually going to use, and that's nice."
"CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
"I would rate CyberArk's pricing a nine out of ten, with one being cheap and ten being expensive. It's one of the most expensive solutions in the market, but it's worth it."
"The SaaS version of CyberArk Enterprise Password Vault is very expensive, but the on-premises version is relative, e.g. depending on the size of the environment, it can be a bit pricey, but it's relatively okay compared to the others."
"This solution is considered to be more expensive than others out there on the market today."
"Pricing varies based on user count/number of modules you need."
"We are using the cloud platform, but we don't find it compatible to be served as a multi-tenant platform. This is a large drawback. It becomes expensive because it is then an all-dedicated solution. You have to have a separate tenant for each client, which increases the cost. The overall unit pricing can be less expensive than how it is right now."
"I rate the product's price a five on a scale of one to ten, where one is cheap, and ten is expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Manufacturing Company
11%
Computer Software Company
7%
Comms Service Provider
6%
Comms Service Provider
13%
Financial Services Firm
11%
Computer Software Company
8%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise42
Large Enterprise174
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise6
 

Questions from the Community

How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
What needs improvement with RSA Identity Governance and Lifecycle?
There is room for improvement with RSA Identity Governance and Lifecycle. As the size becomes larger, the collections and unifications of the IDs process become quite slow, which can be improved fu...
What is your primary use case for RSA Identity Governance and Lifecycle?
We provide RSA Identity Governance and Lifecycle as a service, mainly to oversee the digital identity lifecycle, from the initiation to the off-boarding at the end of that digital identity. Our cli...
What advice do you have for others considering RSA Identity Governance and Lifecycle?
Overall, I would rate RSA Identity Governance and Lifecycle at an eight out of ten.
 

Also Known As

CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
SecurID
 

Overview

 

Sample Customers

Rockwell Automation
NTT Com Asia, Virgin Blue, Bank of Uganda, EMEA Telecommunications Company, LAit (Lazio Innovazione Tecnologica), NyNet, OTP Bank, Red Bull Racing, Rupert House School, Signify, UK Local Authority, Bancolombia, Banco Popular de Puerto Rico (BPPR), TIVIT, Array Services, International Computerware, KPMG LLP, Moffitt Cancer Center
Find out what your peers are saying about CyberArk, One Identity, Okta and others in Privileged Access Management (PAM). Updated: April 2026.
893,311 professionals have used our research since 2012.